Methodologies
Penetration testing typically involves four steps: planning and reconnaissance, identifying vulnerabilities, exploiting vulnerabilities and documenting findings
Cyber Sec Rom follows the most known cyber security methodologies, and for each type of assessment these are configured based on clients needs and requirements.
Methodologies
Cyber Kill Chain Developed by Lockheed Martin, the Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective.
OWASP The Open Worldwide Application Security Project® (OWASP) is a nonprofit foundation that works to improve the security of software. Through community-led open-source software projects, hundreds of local chapters worldwide, tens of thousands of members, and leading educational and training conferences, the OWASP Foundation is the source for developers and technologists to secure the web.
MITRE ATT&CK MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
OSSTMM The Open Source Security Testing Methodology Manual is peer-reviewed and maintained by the Institute for Security and Open Methodologies (ISECOM). It has been primarily developed as a security auditing methodology assessing against regulatory and industry requirements.
NIST The Framework provides a common language for understanding, managing, and expressing cybersecurity risk to internal and external stakeholders. It can be used to help identify and prioritise actions for reducing cybersecurity risk, and it is a tool for aligning policy, business, and technological approaches to managing that risk.
Last updated